{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:39:20Z","timestamp":1725500360166},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775348"},{"type":"electronic","value":"9783540775355"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77535-5_26","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T10:23:47Z","timestamp":1199787827000},"page":"359-370","source":"Crossref","is-referenced-by-count":1,"title":["Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System"],"prefix":"10.1007","author":[{"given":"Myeonggil","family":"Choi","sequence":"first","affiliation":[]},{"given":"Sangmun","family":"Shin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"26_CR1","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1080\/08982119808919219","volume":"11","author":"C.M. Borror","year":"1998","unstructured":"Borror, C.M.: Mean and Variance Modeling with Qualitative Responses: A Case Study. Quality Engineering\u00a011(1), 141\u2013148 (1998)","journal-title":"Quality Engineering"},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s11219-004-5259-6","volume":"13","author":"C\u00f4t\u00e9","year":"2005","unstructured":"C\u00f4t\u00e9, et al.: The evolution Path for Industrial Software Quality Evaluation Methods Applying ISO\/IEC 9126: 2001 Quality Model: 2001 Quality Model: Example of MITRE\u2019s SQAE Method. Software Quality Journal\u00a013, 17\u201339 (2005)","journal-title":"Software Quality Journal"},{"key":"26_CR3","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1080\/00224065.1980.11980968","volume":"12","author":"G.C. Derringer","year":"1980","unstructured":"Derringer, G.C., Suich, R.: Simultaneous Optimization of Several Response Variables. Journal of Quality Technology\u00a012, 214\u2013219 (1980)","journal-title":"Journal of Quality Technology"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/S0167-4048(00)88613-7","volume":"19","author":"M. Eloff","year":"2000","unstructured":"Eloff, M., Solms, S.H.: Information Security Management, Hierarchical Framework for Various Approaches. Computers & Security\u00a019, 243\u2013256 (2000)","journal-title":"Computers & Security"},{"key":"26_CR5","first-page":"494","volume":"21","author":"E.C. Harrington Jr.","year":"1965","unstructured":"Harrington Jr., E.C.: The Desirability Function. Industrial Quality Control\u00a021, 494\u2013498 (1965)","journal-title":"Industrial Quality Control"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Hefner, R., Monroe, W.: System Security Engineering Capability Maturity Model. In: Conference on Software Process Improvement (1997)","DOI":"10.1145\/253228.253454"},{"key":"26_CR7","unstructured":"http:\/\/www.itstv.net\/broad\/news_list.asp?opt=contents&wrd=&page=2&status=list"},{"key":"26_CR8","unstructured":"http:\/\/www.3com.com\/en_US\/jump_page\/embedded_firewall.html"},{"key":"26_CR9","unstructured":"The list of certified products http:\/\/www.ncsc.go.kr\/"},{"key":"26_CR10","unstructured":"ISO\/IEC: Software Engineering-Product Quality-Part1: Quality Model (2001)"},{"issue":"1","key":"26_CR11","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/S0377-2217(02)00255-2","volume":"147","author":"J. Aguar\u00f3n","year":"2003","unstructured":"Aguar\u00f3n, J., et al.: The Geometric Consistency Index: Approximated threshold. European Journal of Operation Research Wood, C. and Snow, K.: ISO 9000 and information, Security, Computer & Security\u00a0147(1), 137\u2013145 (2003)","journal-title":"European Journal of Operation Research Wood, C. and Snow, K.: ISO 9000 and information, Security, Computer & Security"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/11930181","volume-title":"Information Security Practice and Experience","author":"M. Choi","year":"2006","unstructured":"Choi, M., et al.: An Empirical Study of Quality and Cost Based Security Engineering. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds.) ISPEC 2006. LNCS, vol.\u00a03903, Springer, Heidelberg (2006)"},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-540-39866-0_11","volume-title":"Perspectives of System Informatics","author":"N.P. Varnovsky","year":"2004","unstructured":"Varnovsky, N.P., Zakharov, V.A.: On the Possibility of Provably Secure Obfuscating Programs. In: Broy, M., Zamulin, A.V. (eds.) PSI 2003. LNCS, vol.\u00a02890, pp. 91\u2013102. Springer, Heidelberg (2004)"},{"key":"26_CR14","unstructured":"Satty, T.L.: Decision Making for Leaders: The Analytical Hierarchy Process for Decision in a Complex World. RWS Publications (1995)"},{"key":"26_CR15","unstructured":"Shin, S.M., Cho, B.R.: Trade-off Studies on Process Parameters: A Robust Design Perspective. In: The 11th Industrial Engineering Research Conference, Orlando, FL (2002)"},{"issue":"4","key":"26_CR16","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/0167-4048(95)97069-M","volume":"14","author":"C. Wood","year":"1995","unstructured":"Wood, C., Snow, K.: ISO 9000 and information. Security, Computer & Security\u00a014(4), 287\u2013288 (1995)","journal-title":"Security, Computer & Security"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77535-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T13:20:47Z","timestamp":1557148847000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77535-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775348","9783540775355"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77535-5_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}